Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2593069.2593148acmotherconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
research-article

Hardware/Software Co-Design of Elliptic-Curve Cryptography for Resource-Constrained Applications

Published: 01 June 2014 Publication History

Abstract

ECC is an asymmetric encryption providing a comparably high cryptographic strength in relation to the key sizes employed. This makes ECC attractive for resource-constrained systems. While pure hardware solutions usually offer a good performance and a low power consumption, they are inflexible and typically lead to a high area.
Here, we show a flexible design approach using a 163-bit GF(2m) elliptic curve and an 8-bit processor. We propose improvements to state-of-the-art software algorithms and present innovative hardware/software codesign variants. The proposed implementation offers highly competitive performance in terms of performance and area.

References

[1]
H. Aigner, H. Bock, M. Hütter, and J. Wolkerstorfer. A low-cost ECC coprocessor for smartcards. CHES, 2004.
[2]
Atmel Corp. 8-bit Microcontroller with 128K Bytes In-System Programmable Flash: ATmega 128, 2004.
[3]
Batina et al. Hardware architectures for public key cryptography. Integration, the VLSI journal, 2003.
[4]
G. Bertoni, L. Breveglieri, and M. Venturi. Power aware design of an elliptic curve coprocessor for 8 bit platforms. In PerCom. IEEE, 2006.
[5]
H. Bock, M. Braun, M. Dichtl, E. Hess, J. Heyszl, W. Kargl, H. Koroschetz, B. Meyer, and H. Seuschek. A Milestone Towards RFID Products Offering Asymmetric Authentication Based on Elliptic Curve Cryptography. Invited talk at RFIDsec, 2008.
[6]
S. V. D.R. Hankerson and A. Menezes. Guide to Elliptic Curve Cryptography. 2004.
[7]
W. Drescher, K. Bachmann, and G. Fettweis. VLSI architecture for datapath integration of arithmetic over GF(2m) on digital signal processors. In Acoustics, Speech, and Signal Processing, 1997.
[8]
H. Eberle, A. Wander, N. Gura, S. Chang-Shantz, and V. Gupta. Architectural extensions for elliptic curve cryptography over GF(2m) on 8-bit microprocessors. ASAP, 2005.
[9]
Großschädl et al. When Instruction Set Extensions Change Algorithm Design: A Study in Elliptic Curve Cryptography. 2005.
[10]
Gura et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. CHES, 2004.
[11]
D. Hein, J. Wolkerstorfer, and N. Felber. ECC is Ready for RFID--A Proof in Silicon. In Selected Areas in Cryptography, 2009.
[12]
U. Kaiser, C. Paar, J. Pelzl, D. Rappe, W. Schindler, A. Weimarskirch, and T. Wollinger. Auswahlkriterien fuer kryptographische Algorithmen bei Low-Cost-RFID-Systemen, 2005.
[13]
A. Kargl, S. Pyka, and H. Seuschek. Fast arithmetic on ATmega128 for elliptic curve cryptography. context of the SMEPP project, 2008.
[14]
Koschuch et al. Hardware/software co-design of elliptic curve cryptography on an 8051 microcontroller. CHES, 2006.
[15]
S. Kumar and C. Paar. Are standards compliant elliptic curve cryptosystems feasible on RFID? In Workshop on RFID Security, 2006.
[16]
Lee et al. Elliptic-curve-based security processor for RFID. IEEE Transactions on Computers, 2008.
[17]
D. Malan, M. Welsh, and M. Smith. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In Sensor and Ad Hoc Communications and Networks, 2004.
[18]
S. Okada, N. Torii, K. Itoh, and M. Takenaka. Implementation of elliptic curve cryptographic coprocessor over GF(2m) on an FPGA. In CHES, 2000.
[19]
S. Seo, H. Dong-Guk, H. Kim, and H. Seokhie. TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit MICAz Mote. IEICE transactions on information and systems, 2008.
[20]
Z. Shi and H. Yan. Software implementations of elliptic curve cryptography. International Journal of Network Security, 2008.
[21]
Szczechowiak et al. NanoECC: Testing the limits of elliptic curve cryptography in sensor networks. WSNs, 2008.
[22]
E. Wenger, T. Baier, and J. Feichtner. JAAVR: Introducing the Next Generation of Security-enabled RFID Tags. Euromicro Conference on DSD, 2012.
[23]
J. Wolkerstorfer. Scaling ECC Hardware to a Minimum, 2005. Slides of a talk given at Workshop CRASH 2005, Leuven.
[24]
H. Yan and Z. Shi. Studying software implementations of elliptic curve cryptography. In Information Technology: New Generations, 2006.

Cited By

View all
  • (2024)X2065: Lightweight Key Exchange for the Internet of ThingsProceedings of the 10th ACM Cyber-Physical System Security Workshop10.1145/3626205.3659153(43-52)Online publication date: 2-Jul-2024
  • (2021)Cyber-Physical System and Internet of Things SecurityResearch Anthology on Combating Denial-of-Service Attacks10.4018/978-1-7998-5348-0.ch018(328-357)Online publication date: 2021
  • (2021)Edge enhanced deep learning system for IoT edge device security analyticsConcurrency and Computation: Practice and Experience10.1002/cpe.676435:13Online publication date: 7-Dec-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
DAC '14: Proceedings of the 51st Annual Design Automation Conference
June 2014
1249 pages
ISBN:9781450327305
DOI:10.1145/2593069
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 June 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Elliptic Curve Cryptography
  2. Embedded Devices
  3. RFID

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

DAC '14

Acceptance Rates

Overall Acceptance Rate 1,770 of 5,499 submissions, 32%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)1
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)X2065: Lightweight Key Exchange for the Internet of ThingsProceedings of the 10th ACM Cyber-Physical System Security Workshop10.1145/3626205.3659153(43-52)Online publication date: 2-Jul-2024
  • (2021)Cyber-Physical System and Internet of Things SecurityResearch Anthology on Combating Denial-of-Service Attacks10.4018/978-1-7998-5348-0.ch018(328-357)Online publication date: 2021
  • (2021)Edge enhanced deep learning system for IoT edge device security analyticsConcurrency and Computation: Practice and Experience10.1002/cpe.676435:13Online publication date: 7-Dec-2021
  • (2020)Improved Hybrid Approach for Side-Channel Analysis Using Efficient Convolutional Neural Network and Dimensionality ReductionIEEE Access10.1109/ACCESS.2020.30292068(184298-184311)Online publication date: 2020
  • (2019)Enhanced Privacy and AuthenticationWireless Personal Communications: An International Journal10.1007/s11277-015-2699-184:2(1487-1508)Online publication date: 3-Jan-2019
  • (2019)Lightweight Elliptical Curve Cryptography (ECC) for Data Integrity and User Authentication in Smart Transportation IoT SystemSustainable Communication Networks and Application10.1007/978-3-030-34515-0_28(270-278)Online publication date: 7-Nov-2019
  • (2018)Cyber-Physical System and Internet of Things SecuritySolutions for Cyber-Physical Systems Ubiquity10.4018/978-1-5225-2845-6.ch010(248-277)Online publication date: 2018
  • (2018)Fast antinoise RFID-aided medical care systemInternational Journal of Distributed Sensor Networks10.1155/2015/9717102015(3-3)Online publication date: 23-Dec-2018
  • (2018)Dynamic Approach to Secure Smart City Applications (DCESA)2018 Renewable Energies, Power Systems & Green Inclusive Economy (REPS-GIE)10.1109/REPSGIE.2018.8488814(1-6)Online publication date: Apr-2018
  • (2018)Elliptic Curve Lightweight Cryptography: A SurveyIEEE Access10.1109/ACCESS.2018.28814446(72514-72550)Online publication date: 2018
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media